BN301 Industry Project: Cost-Effective Network Scanner Performance

Verified

Added on  2023/06/04

|5
|1041
|300
Report
AI Summary
This report provides a comprehensive analysis of network scanner performance, focusing on cost-effective solutions. It reviews various network scanning tools like Acunetix, Open VAS, Wireshark, Nikto, Angry IP scanner, Qualys Freescan, Soft Perfect Network Scanner, Retina Network Security Scanner, Nessus, and Metasploit framework, evaluating their efficiency in vulnerability detection and network management. The report emphasizes the importance of network scanning for identifying and mitigating security hazards, improving network performance, and managing network resources. It also references academic sources to support its findings and conclusions. Desklib offers a wide array of similar solved assignments and study resources for students.
Document Page
Assignment
Lost Cost Performance Network Scanner
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction................................................................................................................................2
Literature Review:......................................................................................................................2
References:.................................................................................................................................4
Document Page
Introduction
The Network scanner is used for scanning the internet protocol address for the corporate and
thousands of home computers. It focuses on managing the ranges of IP address and utilization
of IP address. The scanning of the resources is based on NETBIOS which make use of file
transfer protocol (FTP) and different web resources. The auditing of the network resources
helps in managing the scanning process of the network resources. The sharing of resources
can be effectively measured by demonstrating the network drives and access rights. The
increasing security hazard activities are getting increased on the network which emphasize on
carrying out the procedures for network scanning [1]. The implication of malware, viruses,
worms, and Trojan are the frequent activities carrying out by the hackers for stealing the
confidential information from different resources. The performance of the network can be
improved by deploying the authentic mechanism for monitoring and scanning of the
connectivity between different resources. The purpose of this feature is to review the
literature for measuring the performance of the network scanner at lowest cost.
Literature Review:
The literature review helps in analysing the efficiency of the different network scanner for
executing the monitoring and scanning of the connectivity. The network scanning is the
process used for identifying the management of resources through UDP and TCP protocols
between the different host computers [2]. The performance of the network scanner can be
measured by analysing the effectiveness of the undertaken tool for scanning by focusing on
the easy to handle, better performance, improved scalability, bringing flexibility in the
filtering process, managing status check for customised computers, managing availability of
resources, auditing of network resources, availability of resources to the user on demand, and
results of network scanning [3]. Some of the low cost high performance network scanner
tools are highlighted below:
Acunetix: This is the automatic network scanner which is used for detecting the presence of
network vulnerabilities and attack. It is used for managing the scanning of the open ports,
firewalls, switches, balancers, proxy servers, DNS transfer, and others.
Document Page
Open VAS: Open Vulnerability assessment system is the free available network scanner
which focuses on carrying out the full scanning of the complete network system, scanning the
web application and server management system, and scanning the word press vulnerabilities.
Wireshark: Wireshark is the open network scanner source tool which is used for analysing
the multi-platform network protocol. The scanning of the vulnerabilities can be effectively
done between the client and the server [4]. It can effectively run on different operating system
such as Windows, Linux, and others.
Nikto: It focuses on managing the rapid testing of the network behaviour. It is based on
HTTP proxy server environment, managing customised format of HTML, and others. It is the
automatic network scanning tools which is helpful in managing the configuration of the
HTTP servers and other Web servers.
Angry IP scanner: The performance of the network can be improved by improving the
efficiency of the network scanner [5]. The Angry IP scanner makes use of multi-threading
management system for improving the scanning process and procedures undertaken. It works
by developing the matrix of the information such as host name, network basic input output
system, name of the computer, working information, and MAC address. The wireless devices
can be effectively detected by this scanner.
Qualys Freescan: It is free and open source network scanner which is used for scanning the
uniform resource locator, internet protocols, and loop holes. It helps in managing the free
scan of vulnerability checks and undergoing the web application security checks [].
Soft Perfect Network Scanner: It is helpful for scanning the IPv4 and IPv6 by deploying the
system of multi-threading procedures. The host name and mac address are used for scanning
the connectivity between the participating units with the implementation of the SNMP
protocol.
Retina Network security Scanner: It is used for analysing the presence of vulnerabilities to
provide security architecture to the Firefox and Microsoft. The network performance can be
improved by analysing the risks associated with the connectivity. It can manage scanning of
256 IP addresses.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Nessus: It is used for scanning the UNIX operating system. The basic features of the Nessus
are interface between the web server, managing the architecture of the client server,
initializing the security checks of remote location, and initializing plug-ins.
Metasploit framework: This tool is effective and efficient for performing the penetration
testing. It is based on java GUI environment. The scanning of the vulnerabilities can be
effectively done between the client and the server.
References:
[1]A. Rahman, K. Kawshik, A. Sourav and A. Gaji, "Advanced network scanning", American
Journal of engineering research, vol. 5, no. 6, pp. 38-42, 2017.
[2]J. Shan, "Analysis and research of computer network security", Journal of chemical and
pharmaceutical research, vol. 6, no. 7, pp. 874-877, 2014.
[3]H. Holm, T. Sommestad, J. Almroth and P. Persson, A quantitative evaluation of
vulnerability scanning, 1st ed. 2004.
[4]J. Nilsson and V. Virta, Vulnerability scanner, 1st ed. 2015.
[5]M. Gaigole and M. Kalayankar, "The study of network security with its penetration attacks
and possible security mechanism", International journal of computer science and
mobile computing, vol. 4, no. 5, pp. 728-735, 2015.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]